Don't-Miss Encryption Stories
Telemedicine has been around since the 1990s, but psychiatrists say it's increasingly used to treat remote patients as technology and security improves.
VeriSign didn't exactly 'disclose' the breach, and the few details buried in the SEC filing create more questions than they answer. Without more to go on, it is hard to know what the risk is.
In the second part of our donationware series, we introduce a few hidden gems that you can download and use for free. All of these programs accept contributions, and some support charities.
These fantastic, well-known utilities are donationware--you can use them for free, but the developers ask for a contribution to keep their work going. Now is a great time to give back to the creators.
Gpg4win is an easy-to-use installer for setting up powerful email and file encryption on your system.
Police are concerned about public snooping of police radios by using smartphones, and some are moving their communication to fully encrypted channels.
Darryl Boyett asked if his home WiFi connection, which uses WPA2 protection, is safe enough for online banking
Cisco has announced a hardware encryption module for its ISR G2 router that allows point-to-point encryption of IP traffic.
Here's how to use DiskCryptor, BitLocker, or TrueCrypt to encrypt sensitive documents or even entire hard drives in Windows.
Here's how to set up a virtual encrypted disk in TrueCrypt to protect specific important files.
Want to keep your important files hidden? Here's how to encrypt your entire hard drive with DiskCryptor.
Here's how to use Windows's built-in BitLocker feature to encrypt your entire hard drive.
BEAST is an exploit developed by security researchers to break the TLS 1.0 encryption used by most major browsers and websites. Here’s how it works, and how you can protect yourself.